Skip to content
Home » Access Rights

Access Rights

Access Rights (in Access Control)

Introduction

Access Rights (also called permissions or privileges) define what actions a subject is allowed to perform on an object. They are the core of authorization—once a user is authenticated, access rights determine the scope of their actions.

👉 Access Rights = What can be done on a resource


Meaning

Access rights specify:

  • Which subject (user/process)
  • Can perform which operation
  • On which object (file, database, system)

📌 They enforce security by controlling operations like read, write, and execute.


Common Types of Access Rights


1. Read (R)

Meaning

Allows a subject to view or read data.

Example

  • Student viewing marks
  • Employee viewing reports

2. Write (W)

Meaning

Allows a subject to modify or update data.

Example

  • Teacher updating student marks
  • Editor modifying documents

3. Execute (X)

Meaning

Allows a subject to run or execute a program.

Example

  • Running a software application
  • Executing a script

4. Delete (D)

Meaning

Allows a subject to remove or delete objects.

Example

  • Admin deleting user accounts
  • Removing files

5. Append (A)

Meaning

Allows a subject to add data without modifying existing content.

Example

  • Adding records to a log file

6. Create (C)

Meaning

Allows a subject to create new objects.

Example

  • Creating new files or database entries

7. Modify (M)

Meaning

Combination of read and write permissions.

Example

  • Editing a document

8. Full Control

Meaning

Grants all permissions (read, write, execute, delete, etc.)

Example

  • System administrator access

Representation of Access Rights

Access Matrix

A table showing permissions of subjects on objects.

Subject/ObjectFile1File2
User AR, WR
User BRX

Access Control List (ACL)

Each object has a list of:

  • Users
  • Their permissions

Example:

File1:
User A → Read, Write  
User B → Read  

Capability List

Each subject has a list of:

  • Objects
  • Permissions

Access Rights in Access Control Models

1. DAC (Discretionary Access Control)

  • Owner assigns access rights

2. MAC (Mandatory Access Control)

  • Based on security labels

3. RBAC (Role-Based Access Control)

  • Based on user roles

📌 Example: Manager role → Read + Write access


Access Rights and Security Principles

  • Least Privilege → Minimum rights assigned
  • Need-to-Know → Only necessary access
  • Separation of Duties → Distributed rights

Access Rights and CIA Triad

  • Confidentiality → Control read access
  • Integrity → Control write/modify access
  • Availability → Ensure authorized access

Real-Life Examples

Example 1: College System

  • Student → Read (view results)
  • Teacher → Read + Write (update marks)
  • Admin → Full control

Example 2: Banking System

  • Customer → Read (account details)
  • Teller → Read + Write (transactions)
  • Manager → Full control

Access Rights in Cyber Law (India)

Under IT Act, 2000:

  • Section 43 → Unauthorized access or misuse
  • Section 66 → Computer-related offences

📌 Improper access rights may lead to legal liability.


Advantages of Access Rights

  • Prevent unauthorized access
  • Protect sensitive data
  • Ensure accountability
  • Improve system security
  • Support compliance

Limitations

  • Misconfigured permissions can cause breaches
  • Complex management in large systems
  • Insider misuse risk

Conclusion

Access rights are the foundation of authorization and access control systems. By clearly defining what actions subjects can perform on objects, organizations can ensure secure, controlled, and efficient use of resources. Proper management of access rights is essential to maintain confidentiality, integrity, and availability of information.


📘 MCA Exam Tip

For 10–15 marks:

  • Define access rights
  • Explain types (R, W, X, etc.)
  • Include access matrix / ACL
  • Give examples
  • Link with CIA Triad